exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 185 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 185
Topic #: 1
[All 312-50v13 Questions]

In a recent cyber-attack against a large corporation, an unknown adversary compromised the network and began escalating privileges and lateral movement. The security team identified that the adversary used a sophisticated set of techniques, specifically targeting zero-day vulnerabilities. As a Certified Ethical Hacker (CEH) hired to understand this attack and propose preventive measures, which of the following actions will be most crucial for your initial analysis?

  • A. Identifying the specific tools used by the adversary for privilege escalation.
  • B. Analyzing the initial exploitation methods, the adversary used.
  • C. Checking the persistence mechanisms used by the adversary in compromised systems.
  • D. Investigating the data exfiltration methods used by the adversary.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Gibsomd
1 month ago
Selected Answer: B
When investigating a cyberattack involving zero-day vulnerabilities, the first priority is to understand how the attacker initially exploited the system.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago